Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

CISA Adds Sierra Router Vulnerability to KEV Catalogue Following Active Exploitation

Posted on December 15, 2025December 15, 2025 By CWS

A crucial vulnerability affecting Sierra Wi-fi routers has been added to its Identified Exploited Vulnerabilities (KEV) catalog.

This choice comes after proof emerged that the flaw is being actively exploited within the wild. Posing important dangers to organizations that also make the most of these legacy gadgets.

Federal companies and personal organizations at the moment are urged to take rapid motion to safe their networks towards this particular menace.

The vulnerability, tracked as CVE-2018-4063, impacts the Sierra Wi-fi AirLink ALEOS working system. It’s described as an “Unrestricted Add of File with Harmful Sort” flaw.

CVE IDCVE-2018-4063DescriptionSierra Wi-fi AirLink ALEOS accommodates an unrestricted add of file with harmful kind vulnerability.Vulnerability NameSierra Wi-fi AirLink ALEOS Unrestricted Add of File with Harmful Sort VulnerabilityRelated CWECWE-434

Safety researchers have decided that the problem permits an authenticated attacker to take advantage of the net server. By sending a specifically crafted HTTP request, a menace actor can add malicious recordsdata on to the machine.

As soon as a malicious file is uploaded, it can lead to the execution of arbitrary code on the internet server. This Distant Code Execution (RCE) functionality successfully provides attackers management over the compromised router.

Though the vulnerability requires authentication to set off, attackers typically exploit it together with weak or default credentials to realize preliminary entry.

The severity of this flaw is compounded by the truth that it permits for persistent entry and potential lateral motion inside a community.

Finish-of-Life Dangers and Mitigation

A crucial side of this alert is the standing of the impacted {hardware}. CISA has famous that the affected Sierra Wi-fi AirLink merchandise could also be Finish-of-Life (EoL) or Finish-of-Service (EoS).

This implies the seller is probably going now not releasing safety updates or patches for these gadgets. Consequently, the usual recommendation to “patch instantly” is just not relevant right here. As a substitute, CISA strongly advises customers to discontinue utilizing these merchandise.

Continued use of EoL {hardware} leaves networks uncovered to identified exploits that can not be remediated by way of software program updates.

Federal Civilian Government Department (FCEB) companies have been given a strict deadline to take away these gadgets from their infrastructure to adjust to Binding Operational Directive (BOD) 22-01.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Active, Adds, Catalogue, CISA, Exploitation, KEV, Router, Sierra, Vulnerability

Post navigation

Previous Post: VolkLocker Ransomware Exposed by Hard-Coded Master Key Allowing Free Decryption
Next Post: Windows Remote Access Connection Manager Vulnerability Enables Arbitrary Code Execution

Related Posts

Hackers Targeting HubSpot Users in Targeted Phishing Attack Hackers Targeting HubSpot Users in Targeted Phishing Attack Cyber Security News
Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Decoding Microsoft 365 Audit Log Events Using Bitfield Mapping Technique Cyber Security News
IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed IRGC-Linked APT35 Structure, Tools, and Espionage Operations Disclosed Cyber Security News
New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials New Tech Support Scam with Microsoft’s Logo Tricks Users to Steal Login Credentials Cyber Security News
FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings FortiOS SSL-VPN Vulnerability Let Attackers Access full SSL-VPN settings Cyber Security News
Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Chinese Hackers Weaponizes Software Vulnerabilities to Compromise Their Targets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark